Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Protect our present, protect our future

CISO’s expert guide to AI supply chain attacks

Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram into Hacker Hub

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cybercriminals exploit remote monitoring tools to infiltrate logistics and cargo networks
Identity

Cybercriminals exploit remote monitoring tools to infiltrate logistics and cargo networks

userBy userNovember 3, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 3, 2025Ravi LakshmananCybercrime/Supply Chain Attack

Criminals are increasingly practicing targeting trucking and logistics companies to infect remote monitoring and management (RMM) software and ultimately steal cargo for financial gain.

According to Proofpoint, this threat cluster is believed to have been active since at least June 2025 and is said to be working with organized crime groups to infiltrate organizations in the ground transportation industry with the ultimate goal of stealing goods. Food and beverages are the most targeted products for cyber-based robberies.

“Stolen cargo will most likely be sold online or shipped overseas,” researchers Ole Villasen and Serena Larsson said in a report shared with Hacker News. “In the campaigns observed, attackers aim to infiltrate businesses, use unauthorized access to bid on actual shipments of goods, and ultimately steal the goods.”

DFIR retainer service

This campaign shares similarities with a previous series of attacks revealed in September 2024. The attack involved targeting transportation and logistics companies in North America using information theft tools such as Lumma Stealer, StealC, and NetSupport RAT, as well as remote access Trojans (RATs). However, there is no evidence that they are the work of the same attacker.

In the current wave of intrusions detected by Proofpoint, unknown attackers are leveraging multiple methods, including compromising email accounts to hijack existing conversations, targeting asset-based carriers, freight brokers, and integrated supply chain providers with spear-phishing emails, and posting fraudulent cargo listings to load boards using hacked accounts.

“The attackers use compromised accounts to post fraudulent shipment listings on freight boards and then send emails containing malicious URLs to carriers inquiring about their shipments,” the report states. “This tactic takes advantage of the credibility and urgency inherent in freight negotiations.”

Needless to say, the malicious URL embedded within the message leads to a booby-trapped MSI installer or executable that deploys legitimate RMM tools such as ScreenConnect, SimpleHelp, PDQ Connect, Fleetdeck, N-able, and LogMeIn Resolve. In some instances, some of these programs are used together, and PDQ Connect is used to drop and install ScreenConnect and SimpleHelp.

Once they gain remote access, attackers begin reconnaissance of systems and networks, then drop credential harvesting tools such as WebBrowserPassView to obtain additional credentials and penetrate deeper into the corporate network.

In at least one case, the attackers are believed to have used their access to delete existing reservations, block dispatcher notifications, add their devices to the dispatcher’s phone extension, book packages in the compromised carrier’s name, and coordinate transportation.

CIS build kit

There are several benefits to using RMM software. First, it eliminates the need for threat actors to invent bespoke malware. Second, the prevalence of such tools in enterprise environments allows them to fly under the radar and typically go unflagged as malicious by security solutions.

“Because it is very easy for attackers to create and distribute attacker-proprietary remote monitoring tools, and because they are often used as legitimate software, end users may be less suspicious of RMM installations than with other remote access Trojans. Additionally, because the installers are often maliciously distributed with signed legitimate payloads, such tools may evade antivirus and network detection,” Proofpoint said. Pointed out in March 2025.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More
Next Article MHRA signals major changes in rare disease treatment
user
  • Website

Related Posts

CISO’s expert guide to AI supply chain attacks

November 11, 2025

Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram into Hacker Hub

November 11, 2025

Hackers exploit Triofox flaw to install remote access tools via antivirus

November 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Protect our present, protect our future

CISO’s expert guide to AI supply chain attacks

Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram into Hacker Hub

Sweden invests SEK 95 million to lead the green technology race

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.